Preview

Cobit Casestudy Tibo

Better Essays
Open Document
Open Document
8174 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Cobit Casestudy Tibo
COBIT® CASE STUDY: TIBO

An extended case study in which students can apply their COBIT knowledge to a real-life situation

C O B I T ® i n A c a d e m i a TM

IT Governance Institute

1

COBIT
IT Governance Institute®
The IT Governance Institute (ITGI) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that
IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. The IT Governance Institute offers symposia, original research and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities.
Information Systems Audit and Control Association®
With more than 35,000 members in more than 100 countries, the Information Systems Audit and Control Association
(ISACA®) (www.isaca.org) is a recognised worldwide leader in IT governance, control, security and assurance. Founded in 1969, ISACA sponsors international conferences, publishes the Information Systems Control Journal®, develops international information systems auditing and control standards, and administers the globally respected Certified
Information Systems Auditor™ (CISA®) designation, earned by more than 35,000 professionals since inception, and the
Certified Information Security Manager® (CISM®) designation, a groundbreaking credential earned by 5,000 professionals in its first two years.
Disclaimer
The IT Governance Institute, Information Systems Audit and Control Association [the “Owner(s)”] and the authors have designed and created COBIT in Academia and its related publications, titled COBIT® Case Study: TIBO, COBIT® Student
Book, COBIT® Caselets and COBIT® Presentation Package, (the “Work”), primarily as an educational resource for educators. The Owners make no claim that use of any of the Work will assure a successful outcome. The Work should not be

You May Also Find These Documents Helpful

  • Powerful Essays

    IS 535 Essay Example

    • 1001 Words
    • 4 Pages

    helps a firm identify points at which information technology can most effectively enhance its competitive position.…

    • 1001 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Hunton, J. E., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. Hoboken, NJ: Wiley.…

    • 1007 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    * CompTIA is the vox of the world's aggregation technology (IT) manufacture. As a non-profit swop connexion advancing the globose interests of IT professionals and companies. It focuses its programs on quaternion primary areas: training, substantiation, advocacy and philanthropy. CompTIA is the directive businessperson of technology-neutral and vendor-neutral IT certifications. These certifications allow A quality, Web nonnegative and Warranty…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Acct 542 Audit Proposal

    • 1234 Words
    • 5 Pages

    Hunton, J.A., Bryant, S.M., & Bagranoff, N.A. (2004). Core Concepts of Information Technology Auditing. New York, New York: Wiley & Sons.…

    • 1234 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    Audit Proposal

    • 1321 Words
    • 6 Pages

    Hunton, J. A., Bryant, S. M., & Bagranoff, N. A. (2004). Core concepts of information technology auditing. New York: Wiley & Sons.…

    • 1321 Words
    • 6 Pages
    Better Essays
  • Good Essays

    By enabling the business strategy with IT an organization has the ability to go over and improve the overall…

    • 432 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    CATSA Case Analysis

    • 763 Words
    • 4 Pages

    CATSA’s mission is to become the world’s best in air transportation security by achieving corporate and operational excellence. It believes it can achieve this vision by being cost effective, clear accountability, networking with partners, pursuing innovation without compromising their ethics and values. One of the major key factor for CATSA’s success is that the company knows about its weaknesses and is strongly pursuing ways to remove them. Implementation of new BI will not only help the Balanced Scorecard in improving strategic management but will also help develop better capabilities in business processes such as planning, monitoring, operations, human resources and training. BI would also help CATSA consolidate its data and use it for invoice management, incident reporting and performance analysis of various attributes of business systems. With these steps towards future will definitely give CATSA an edge over other security agencies around the world.…

    • 763 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Canadian Shield Case

    • 1115 Words
    • 5 Pages

    As the leader of Information Systems at Canadian Shield, one of many subsidiaries of Assurance Centrale, Seamus Reynolds was tasked with piloting a new information system that could potentially replace the IS’s at all of Assurance Centrale’s regional offices. Five years after starting this project he was feeling the weight of the responsibility for a project that could eventually transform the entire enterprise.…

    • 1115 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Enterprise It at Cisco

    • 1038 Words
    • 5 Pages

    This case study goes through the evolution of IT governance at Cisco and the related project management. This case is a classic example of the result of a decentralized governance of business units. What happened to CISCO due to the decentralized governance, how the business processes were modified to overcome the chaos created by the decentralized governance and how the employees and management reacted to this change in CISCO’s business governance? This case clearly illustrates the effect of a totally decentralized governance and how changing to a centralized governance leads to unrest and resistance. It also illustrates how the cultural/managerial change effects the business decisions needed to be made by a company to achieve success. Essentially, the case shows that IT governance must be aligned with business activities and tie all functions together to support the company’s strategy.…

    • 1038 Words
    • 5 Pages
    Good Essays
  • Better Essays

    The role of auditing: an MIS audit examines the firms overall security environment as well as controls governing individual information systems…

    • 1209 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    References: IT IG Board Briefing in IT Governance, 2nd Edition, IT Governance Institute, 2003, www.itigi.org…

    • 2116 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    Included with this full-text Harvard Business Review article: 1 Article Summary The Idea in Brief—the core idea The Idea in Practice—putting the idea to work 2 Six IT Decisions Your IT People Shouldn’t Make 10 Further Reading A list of related materials, with annotations to guide further exploration of the article’s ideas and applications…

    • 6704 Words
    • 27 Pages
    Powerful Essays
  • Good Essays

    awesome research

    • 7892 Words
    • 39 Pages

    and maintains the COBIT®, Val IT™ and Risk IT frameworks, which help IT professionals and enterprise leaders fulfil their IT…

    • 7892 Words
    • 39 Pages
    Good Essays
  • Powerful Essays

    C O L L E G E O F B U S I N E S S A D M I N I S T R A T I O N…

    • 5185 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Exponential growth of the Internet and the transmission bandwidth of the communication carrier is transforming the way businesses operate and communicate. In this technology-centric world, customers, partners, suppliers and employees are demanding unparalleled levels of service, collaboration and communications, to compete in the emerging market place. Technology has become so advanced and IT auditing advances as well. However, the fact still remains that even if technology has become very advanced risks and potential harm to integrity and accuracy of the data still remains especially in cyber commerce. Cyber commerce has three categories which are business-to-business (B2B), business-to-customers (B2C) and mobile commerce (m-commerce). Today, the term “e-commerce” includes all commercial activities performed through information technology and communication engineering, such as the Internet, virtual private networks (VPNs), automated teller machines (ATMs), electronic fund transfers (EFTs), electronic data interchange (EDI), e-supply chain management (e-SCM) and e-customer relationship management. E-commerce is now a trend and IT auditors must audit them to minimize the threats and risks that come with it. IT auditors look into existing internal controls, which might not have been optimized for the best results. There are several reasons why internal control cannot provide absolute assurance that objectives will be achieved: cost-benefit realities, collusion among employees and external events beyond an organization’s control.…

    • 2481 Words
    • 10 Pages
    Powerful Essays